Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <f6b35102-dba7-47f6-8a26-64866ba35f13@cpansec.org>
Date: Mon, 11 May 2026 20:14:30 +0100
From: Robert Rothenberg <rrwo@...nsec.org>
To: cve-announce@...urity.metacpan.org, oss-security@...ts.openwall.com
Subject: CVE-2026-6146: Amazon::Credentials versions through 1.2.0 for Perl
 uses rand to generate encryption keys


========================================================================
CVE-2026-6146                                        CPAN Security Group
========================================================================

         CVE ID:  CVE-2026-6146
   Distribution:  Amazon-Credentials
       Versions:  through 1.2.0

       MetaCPAN:  https://metacpan.org/dist/Amazon-Credentials
       VCS Repo:  https://github.com/rlauer6/Amazon-Credentials


Amazon::Credentials versions through 1.2.0 for Perl uses rand to
generate encryption keys

Description
-----------
Amazon::Credentials versions through 1.2.0 for Perl uses rand to
generate encryption keys.

Amazon::Credentials stores credentials in an obfuscated form to prevent
access to the secrets from a data dump of the object.

Before version 1.3.0, the secrets were encrypted using a 64-bit key
that was generated using the built-in rand function, which is
predictable and unsuitable for cryptography.

Problem types
-------------
- CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
   (PRNG)

Solutions
---------
Upgrade to version 1.3.0 or later.


References
----------
https://metacpan.org/release/BIGFOOT/Amazon-Credentials-1.2.0/source/lib/Amazon/Credentials.pm#L1415-1418
https://metacpan.org/release/BIGFOOT/Amazon-Credentials-1.3.0/changes



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.